799
799
Apr 26, 2012
04/12
by
Recon
movies
eye 799
favorite 1
comment 0
Internet filtering Many countries in the world perform extensive network surveillance, filtering in the form of website blocking or protocol specific censorship; recently many networked authoritarian events in the Middle East/North Africa and across most of the world have come to light. During some specific political uprisings came increased invasive filtering events. I've run a series of tests in many of these countries, during these events with the specific purpose of identifying specific...
Topic: Recon, Jacob Appelbaum, Internet Censorship, Tor, Recon 2011,
152
152
movies
eye 152
favorite 0
comment 0
Checkpoint-Restart: Proprietary Hardware and the "Spiderweb API" This summary describes a package to transparently checkpoint and restart applications which run over Infiniband. Infiniband is rapidly growing as a high-speed interconnect, even appearing on departmental clusters. The current work grew out of the needs of high performance computing. As of November, 2010, 43% of the TOP500 supercomputers run Infiniband. However, the ability to checkpoint immediately provides access to a...
Topic: Recon 2011, Recon, Reverse Engineering, Infiniband
571
571
Aug 10, 2011
08/11
by
Recon
movies
eye 571
favorite 0
comment 0
(Bug: if the video is black use the QuickTime video instead) This presentation is about a remote kernel debugger leveraging the hardware virtualization facilities provided by modern processors. The hypervisor is loaded "on the fly" with DMA requests and allow to debug the target without rebooting. The client part leverages the metasm framework. This presentation is about a remote kernel debugger leveraging the hardware virtualization facilities provided by modern processors. This...
Topics: Recon, VirtDbg, Reverse Engineering
583
583
movies
eye 583
favorite 0
comment 0
RFID Hacking In the last years RFID did become a ubiquitous part of our life. We are confronted daily with RFID applications in access control systems, as micro-payment, in electronic IDs and public transportation. Despite of the huge impact, still very little is known on many systems out there - questions on security and privacy features remain unanswered by most system vendors. This talks explains how black box RFID systems can be analyzed and reverse engineered to understand the protocols...
Topic: Recon, Milosch Meriac, RFID, RFID Hacking, Hacking, OpenPCD
5,004
5.0K
Aug 1, 2011
08/11
by
Recon
movies
eye 5,004
favorite 0
comment 0
(Bug: if the video is black use the QuickTime video instead) Reverse engineers have to analyze more and more code these days, be it is investigation of malware, software security assessment, or RE for interoperability. While plain C code is quite familiar by now, C++ offers new challenges with inheritance, virtual functions, exception handling and so on. I will describe the common problems encountered in C++ reversing and how to deal with them. We'll also see how to get nice readable code using...
Topic: Reverse Engineering, IDA, Recon, Decompilation
1,057
1.1K
movies
eye 1,057
favorite 0
comment 0
(Bug: if the video is black use the QuickTime video instead) Automated JTAG/serial scanning, building your own FLASH programmer, re-documenting IC's. Using arduino based scanning tools the techniques shown for hacking embedded devices should be accessible to anyone with basic programming skills. This talk will explain the workflow and toolkit to make analysis of nearly any device more accessible. Every layer of design in a device, from logic to software, requires a means for debugging. These...
362
362
Aug 2, 2011
08/11
by
Recon
movies
eye 362
favorite 0
comment 0
(Bug: if the video is black use the QuickTime video instead) Firmware and embedded software have already targets of choice in the past. In the same spirit, this talk will discuss about how an attacker can take advantages of a laptop's keyboard controller. The keyboard controller (KBC) or embedded controller (EC) is most often an unknown component of our laptop. It is an independent computation unit, alongside the main processor. Firmwares and embedded software have already targets of choice in...
2,646
2.6K
Jul 29, 2011
07/11
by
Recon
movies
eye 2,646
favorite 1
comment 0
This talk will be an introduction to doing "hardware stuff" stuff, for people accustomed to plying their trade against software. I will discuss how to build tools (and use existing tools) to sniff/spy on a variety of hardware communications channels from UART Serial (the kind in your computer) to the very ubiquitous SPI/I2C serial busses used in virtual everything (from EEPROM in your portable DVD player to the HDMI/VGA cables between your computer and monitor). I will demonstrate how...
Topics: Recon, Hardware, Reverse Engineering
1,103
1.1K
Aug 11, 2011
08/11
by
Recon
movies
eye 1,103
favorite 0
comment 0
The Dalvik Virtual Machine supports using Eclipse and JDB to enable developers to debug their Android applications; when used with decompiled sources, these tools become balky and clumsy, making reverse engineering Dalvik applications harder than it has to be. Scott Dunlop will unveil AndBug, a scriptable open source debugger targeting Dalvik applications intended to be used by reverse engineers to script breakpoints that can trace process flow and change state.
Topics: Recon, android, dalvik